Malicious code detecting method applicable to android App

A malicious code detection and malicious code technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of high time-consuming and inability to accurately and comprehensively detect malicious code behaviors, achieve rapid classification and detection, and improve response Ability, speed-up effect

Inactive Publication Date: 2017-07-14
CENT SOUTH UNIV
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In summary, although static detection does not need to run programs, has high code coverage and short detection time, it cannot accurately and comprehensively detect malicious code behavior; although dynamic detection is more comprehensive, it takes a long time and has a negative imp...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code detecting method applicable to android App
  • Malicious code detecting method applicable to android App
  • Malicious code detecting method applicable to android App

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0029] The embodiment of the present invention is an Android application malicious code detection model based on a terminal, a server and a network. The model architecture diagram of this method is shown in figure 1 shown. , The terminal is a webpage system with BS architecture, which can run on traditional PCs, tablets or mobile phones, such as Windows, Android, etc. The core of the terminal is a network service module, which is composed of an application receiving interface and a matching module. The server side includes a service dispatching center. The service dispatching center calls the corresponding service technology to serve it according to the service request of the terminal. Specifically, the application receiving interface uploads an application sample and sends a request to the server, and the service dispatching center communicates it wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious code detection method for Android applications. The server side analyzes the pre-extracted application feature values ​​through a random forest algorithm, thereby establishing a relationship database between applications and malicious codes. Get the data to match and get the test result. Using the advantages of random forest analysis, combined with the idea of ​​application and malicious code classification, a model of application malicious code detection is established based on this method, which can quickly classify and detect existing application malicious code, and can detect new variant malicious codes. The application has certain analysis and detection capabilities, which can meet the ever-changing needs of Android system applications, speed up the detection of malicious applications and codes, and improve the ability to respond to unknown malicious applications.

Description

technical field [0001] The invention belongs to the field of code detection, in particular to a malicious code detection method for Android applications. Background technique [0002] Since the release of the Android system, it has expanded rapidly around the world. According to IDC data, by 2015, Android's market share in mobile operating systems exceeded 80%, and the annual shipments exceeded 1 billion It has become the most widely used smartphone operating system at present. As a result, there are more and more Android applications released. [0003] Due to the openness of the operating system, Android applications have become messy and numerous. A large part of users still think that the security of mobile terminals is not important. There are many third-party mobile markets with chaotic management in the market. Supervision poses a very serious threat to the security of Android terminals. [0004] The openness of the Android operating system lowers its development th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 王国军彭珊周雷刘嫔
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products